RSA SecurID Token User Guide February 12, 2015
|
|
- Stewart Barker
- 8 years ago
- Views:
Transcription
1 RSA SecurID Token User Guide
2 Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel Section VI Handling an RSA SecurID token in Next tokencode required mode Appendix RSA SecurID token request form... 34
3 Page 1 of 34 Section I How to request an RSA SecurID token 1) To obtain an RSA SecurID token, you must fill out the form that is in the Appendix of this document, obtain the required signatures and send it to the OIT Help Desk. 2) There are a three ways that are used to access target servers with RSA SecurID authentication: a. If you will be accessing a Unix or Linux-based server, you will likely first open as SSH session with a tunneling server known as epoxy.princeton.edu. The epoxy.princeton.edu server will provide the RSA SecurID authentication. b. If you will be accessing a Windows terminal server that has the RSA SecurID authentication service installed, you will be able to authenticate to the terminal server directly through a Remote Desktop connection from your workstation. Currently, users accessing the University s and McCarter s ticketing systems use terminal servers with RSA SecurID authentication installed. In this case, you normally would not need access to epoxy.princeton.edu. c. If you must administer a protected Windows system that does not have the RSA SecurID service, you must first open an SSH session with epoxy.princeton.edu that will provide the RSA SecurID authentication and securely tunnel the Remote Desktop session. 3) In case b above, where you will not be using the epoxy SSH tunnel, you can submit your RSA SecurID token form, and the OIT Help Desk will set up your RSA SecurID account, and will provide you with your RSA SecurID token. You skip the remainder of this section and proceed to Section II Setting your RSA SecurID PIN. 4) If you will be using epoxy, before you can begin to access the epoxy tunnel, the NetID that you will be using with your RSA SecurID token must be authorized as follows: Section I How to request an RSA SecurID token
4 Page 2 of 34 a. You must enable Unix for the NetID that will be associated with the RSA SecurID token, and select a shell by following the procedure described in the following OIT KnowledgeBase article: From the KnowledgeBase article, click the Enable Unix Account link. b. You will be asked to log in. You should use the NetID that will be associated with the requested RSA SecurID token. Section I How to request an RSA SecurID token
5 Page 3 of 34 c. If the page that is returned has a heading that says Update your Unix account, Unix is already enabled for your account. In this case proceed to step g. Otherwise, continue to the next step. d. If the page has a heading that says Enable your Unix account, you should click the radio button next to the Enable my Unix account label, and then click the Enable my Account button. Section I How to request an RSA SecurID token
6 Page 4 of 34 e. The following message will be returned. You should wait ten minutes for Unix to be enabled. f. You should then go back to the web site to set your Unix shell. After logging in, the following page will be displayed: Section I How to request an RSA SecurID token
7 Page 5 of 34 g. You should choose the Unix shell that you wish to use in a Unix environment, click the appropriate radio button, and then click the Submit Change button. The example shows the selection of the Bourne shell, but any shell would be OK. h. Once you ve selected a shell, the following page will be displayed: i. Once you have selected a default shell, you should ask the OIT Help Desk (258-HELP) to submit an OPM ticket asking OIT s Enterprise Servers and Storage group to add the NetID to the group authorized to use RSA SecurID authentication access on the SSH tunneling server, epoxy.princeton.edu. Authorization usually takes between 1 and 2 hours to complete. j. Once ESS completes the request, the OIT Help Desk will set up your RSA SecurID account, and will provide you with your RSA SecurID token. Then, proceed to Section II Setting your RSA SecurID PIN. Section I How to request an RSA SecurID token
8 Page 6 of 34 Section II Setting your RSA SecurID PIN You can use one of the following two methods to set your PIN: Method 1 You can use the RSA SecurID Self-Service website to set the PIN by performing the following steps: Note - You must either be on-campus or, if off-campus, using VPN technology to perform this procedure. 1) Visit the following website The following page will be displayed. Enter your RSA SecurID user ID and click on the Log on link. 2) The following page will be displayed. Section II Setting your RSA SecurID PIN
9 Page 7 of 34 3) Click the down arrow next to Authentication Method: to open the drop down menu, and click the Passcode menu item. 4) After selecting the Passcode option, click the Log On button. 5) In the following page, enter ONLY the number that is displayed on the RSA SecurID token s LCD in the Passcode: text box Section II Setting your RSA SecurID PIN
10 Page 8 of 34 6) In the following page, enter the following information into the form: a. Enter your new PIN in the text box labeled New PIN: with the following restrictions: it must be a minimum of four characters (alpha or numeric), and cannot match any of your three previous PINs. b. Verify it by entering again in the text box labeled Confirm New PIN: c. Wait for the number on the RSA SecurID token s LCD to change and enter that number into the text box labeled Next Tokencode:, and click the OK button to submit. Section II Setting your RSA SecurID PIN
11 Page 9 of 34 7) The following page will be displayed confirming that the PIN has been successfully set. Notes You will see a note on the above screen indicating that your password has expired, and that you have not answered the security questions. We currently are neither using a password to override token authentication nor security questions for self-service resets, so you can ignore both messages. 8) At this point, you can log out of self-service by clicking the Log Out link in the upper right hand corner of the page. Section II Setting your RSA SecurID PIN
12 Page 10 of 34 Method 2 If you are authorized to use the epoxy.princeton.edu tunneling server and have already set up PuTTY on your system by following the instructions in Section III (Windows users) or Section IV (Mac or Linux users) of this document, you can set your RSA SecurID token PIN through a connection to the epoxy.princeton.edu server. 1) If you are a Mac or Linux workstation user, you should open a terminal window, enter the following command ssh epoxy.princeton.edu, and skip to step 4. 2) If you are a Windows user using PuTTY, you should open PuTTY and load the PuTTY configuration that you had set up on your Windows system by selecting the configuration name that you had set up (in this case My Configuration ) and then clicking the Load button. Section II Setting your RSA SecurID PIN
13 Page 11 of 34 3) After verifying that the Host Name is set to epoxy.princeton.edu, the Port is equal to 22 and the Connection Type is set to SSH, the user should click Open to open the session. 4) On both the PuTTY window on Windows and the terminal server window on Mac workstations, epoxy will display a Login as: prompt. You should enter your RSA SecurID assigned user ID. 5) When prompted for your passcode, ONLY enter the value displayed on the RSA SecurID token s LCD, since the token currently has no PIN. Section II Setting your RSA SecurID PIN
14 Page 12 of 34 6) Upon successful entry of the passcode, you will be asked if he or she wants to enter a PIN. Enter a Y, otherwise, the session will be disconnected. 7) Select a new PIN of 4 to 8 alphanumeric values when prompted. 8) After you enter the new PIN for the first time, the system will ask you to verify the PIN value by re-entering it at the prompt. 9) If the values match and meet the minimum 4 to 8 alphanumeric character standard, you will receive a Passcode: prompt. You must wait until the value displayed on the LCD has changed Section II Setting your RSA SecurID PIN
15 Page 13 of 34 from the one entered in the original logon. Once it has changed, you should test your passcode by entering the new PIN followed by the LCD value. 10) If the Passcode is successfully entered, the epoxy.princeton.edu session will be established and a command prompt presented. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server 1) If you are using a Windows device to access your target system, download and install the Putty SSH client from to open SSH connections to epoxy.princeton.edu, our tunneling server. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
16 Page 14 of 34 2) Open PuTTY. The following screen will be displayed: 3) In the initial window, enter epoxy.princeton.edu in the Host Name field, and make sure the "Port" field is set to 22. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
17 Page 15 of 34 4) Scroll down the menu items, to the "SSH" menu item under "Connection", Click on the "+" to the left of SSH, and then, on the expanded menu under SSH, click on Tunnels 5) The following screen will be displayed: Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
18 Page 16 of 34 6) In the "Add new forwarded port" section, enter in the "Source Port" field. Then, enter (the name of the server to which you want to RDP).princeton.edu:3389 in the "Destination" field. Make sure that, under the Destination label, the Local and Auto radio buttons are selected. Then click the Add button. 7) The following screen will be displayed with the server name that you entered: Note - When you are using tunneling and you activate the tunnel, if you want to open up a Remote Desktop session with server1name.princeton.edu, you must connect to localhost: The way tunneling works in this scenario is that PuTTY will see your request to connect to localhost port Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
19 Page 17 of , compare it to its tunneling table and, upon seeing the match, will direct your RDP request to the destination associated with that localhost port in this case server1name.princeton.edu. You must create one forwarded port for each server to which you want to RDP. For example, you might set up (source port) to remote desktop to (a second server to which I want to RDP).princeton.edu:3389 8) To add another destination server, do the same thing: In the "Add new forwarded port" section, enter in the "Source Port" field. Then, enter (the name of the server to which you want to RDP).princeton.edu:3389 in the "Destination" field. Make sure that, under the Destination label, the Local and Auto radio buttons are selected. Then click the Add button. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
20 Page 18 of 34 9) The following screen will be displayed after you enter the second server: 10) Continue adding as many destination servers as you need following steps 8 and 9. When you ve finished adding servers, go to the top of the menu on the left of the configuration screen and click the "Session" menu item at the very top of the menu. 11) The following screen will be displayed: Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
21 Page 19 of 34 12) Enter a name of your choosing for the configuration. Then, click the "Save" button. 13) PuTTY is now ready for tunneled Remote Desktop sessions. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server
22 Page 20 of 34 Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server If you need to Remote Desktop to a Windows server through the epoxy.princeton.edu tunnel using a Mac workstation, you will need to configure your Mac as follows: 1) Open a terminal window on the Mac. 2) At the prompt, enter in the following command followed by the enter key: defaults write com.apple.finder AppleShowAllFiles YES 3) At the prompt, enter the following command followed by the enter key: killall Finder Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server
23 Page 21 of 34 4) Open up a finder window. Under the Go menu, click the Go to Folder menu item. 5) The following window will open: 6) Enter the value ~/.ssh into the text box. 7) A list of files in the directory will be displayed. Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server
24 Page 22 of 34 8) If there is no file named config in the directory list, open up the TextEdit.app program and create a new text document. 9) If the config file does exist, right click the config file and open it with the TextEdit.app program. 10) Add the following lines to your config file: LocalForward server1name.princeton.edu:3389 LocalForward server2name.princeton.edu:3389 LocalForward server3name.princeton.edu:3389 Note Replace server1name with the host name of the first server to which you will Remote Desktop Replace server2name with the host name of the second server (if needed) Replace server3name with the host name of the second server (if needed), etc. Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server
25 Page 23 of 34 11) After entering the necessary LocalForward commands into the file, click Save under the file menu. 12) If the config file previously existed, the save will be saved and no further action needs to be taken. 13) If you created a new config file, the following will be displayed when you click the Save menu item: Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server
26 Page 24 of 34 14) In the Save As: text box, enter the tilde ~ character. This will cause the following popup to be displayed: 15) Set the Go to the folder: text box to the following value: ~/.ssh Then click the Go button. 16) Enter config into the Save As: text box. Then, click the Save button to save the config file. Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server
27 Page 25 of 34 Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel When a user wants to connect to a server that he or she supports or uses via the epoxy tunneling server, he or she must perform the following steps: 1) If you are a Mac or Linux workstation user, you should open a terminal window, enter the following command ssh epoxy.princeton.edu, and skip to step 4. 2) If you are a Windows user using PuTTY, you should open PuTTY and load the PuTTY configuration that you had set up on your Windows system by selecting the configuration name that you had set up (in this case My Configuration ) and then clicking the Load button. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel
28 Page 26 of 34 3) After verifying that the Host Name is set to epoxy.princeton.edu, the Port is equal to 22 and the Connection Type is set to SSH, the user should click Open to open the session. 4) On both the PuTTY window on Windows and the terminal server window on Mac workstations, epoxy will display a Login as: prompt. You should enter your RSA SecurID assigned user ID. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel
29 Page 27 of 34 5) Next, you will be prompted for your Passcode". Enter your PIN immediately followed by the number on your assigned RSA SecurID token in one string. 6) Once the login is successful, you will have an open SSH session with the epoxy tunneling server. You must keep the Windows PuTTY session or Mac Terminal window open - that is your connection to the SSH tunnel. The session can be minimized. 7) Then, you can then start up the Remote Desktop client application. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel
30 Page 28 of 34 Notes - You should NOT open the Remote Desktop session with the actual name of the target server since all access to the device must come through the epoxy tunnel. Instead, the Remote Desktop session must be made with "localhost:xxxxx" (where xxxxx is the local port that you defined in your PuTTY configuration or Mac config file for the server that you wish to access. In the PuTTY and Mac client setup sections, we suggested that, since the Remote Desktop port is usually 3389, you could set local port for the first server, for the second, etc., but the local port numbers can be set to any value (OVER 1023) that you prefer. 8) Log into the server with your assigned server ID and password. You should now be connected to the target system. NOTE your ID may be different than your SecurID user ID. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel
31 Page 29 of 34 Section VI Handling an RSA SecurID token in Next tokencode required mode You may encounter a very confusing situation where you receive a second Passcode: prompt when attempting to access the epoxy server It appears as if the first passcode you entered failed, since the two prompts are identical Passcode: displays and no other message is provided. If this occurs, your passcode may very well have been entered correctly, but your token might be in Next tokencode mode. This usually occurs after you ve previously entered a couple of incorrect passcode values. When your token is in Next tokencode mode, the system is requiring you to log in once successfully with your PIN and value on the token s LCD at the first Passcode: prompt, and then to provide the next value on the token s LCD WITHOUT THE PIN - to a subsequent Passcode: prompt. If this occurs, proceed as follows: Method 1: 1) When prompted for the User name:, enter the user ID associated with the token 2) When prompted the first time for the Passcode: enter your PIN and the number on the LCD of your RSA SecurID token. 3) When prompted the second time for the Passcode:, wait for the number on your token s LCD to change, and then ONLY enter the number on the LCD of your RSA SecurID token. Method 2: 1) Enter the following URL into your web browser: Section VI Handling an RSA SecurID token in Next tokencode required mode
32 Page 30 of 34 2) Enter your NetID in the User ID: text box. Then, click the OK button. 3) The following page will be displayed. 4) Change the value of the drop down to Passcode. Section VI Handling an RSA SecurID token in Next tokencode required mode
33 Page 31 of 34 5) Click the Log On button. 6) The following page will be displayed. 7) In the Passcode: text box, enter the PIN associated with your token immediately followed by the number that is displayed on the token s LCD. Then, click the Log On button. Section VI Handling an RSA SecurID token in Next tokencode required mode
34 Page 32 of 34 8) The following page will be displayed. 9) Wait for the number on the token s LCD to change. Then, enter ONLY the number on the LCD into the Next Tokencode: text box and click the OK button. Section VI Handling an RSA SecurID token in Next tokencode required mode
35 Page 33 of 34 10) When you have successfully logged in, the following page will be displayed and the token will be out of Next Tokencode mode, so your next logon will be a normal one. 11) At this point you can click on the Log Off link at the upper right hand portion of the page. Section VI Handling an RSA SecurID token in Next tokencode required mode
36 Page 34 of 34 Appendix RSA SecurID token request form The next page is the form that should be used by anyone who needs to request an RSA SecurID token. It can also be found on the Information Security website at: Appendix RSA SecurID token request form
37 An RSA SecurID Token ( Token ) is being requested by: RSA SecurID Token Request Form Name ( Assignee ): Campus Address: Sponsoring Department: OIT-issued NetID: Phone: Chart String: for the following Purposes: By signing below, the Assignee, Manager and Department Head acknowledge that they have read and agree to the following: The Token is the property of Princeton University s OIT. Its use and disposition is under the administration and jurisdiction of the University s Information Security Office. The Token may only be used for the purposes listed above. In the event these purposes change, the Assignee, Manager or Department Head must notify the University s Information Security Office. The Token must not be shared with any individual, unless such arrangement is made in advance with the University s Information Security Office; The Assignee, Manager or Department Head must promptly notify the University s Information Security Office if the Token is lost or stolen. The Assignee, Manager or Department Head is also required to promptly notify and return the Token to the University s Information Security Office, if: o It is used by anyone other than the Assignee, o It is used for purposes other than those listed above, o The Assignee transfers from the department listed herein to another University department, o The Assignee s association with the University ends, either voluntarily or involuntarily, or o The Token is damaged or is not functioning properly. Assignee: Manager: Department Head: Information Security Office: Issued by: Print Name Signature Date Rev 1-12/9/2014
Logging into Citrix (Epic) using an RSA Soft Token - New RSA User
Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Soft Token Installation and Logging into Citrix (Epic) using an RSA Soft Token A. For new RSA users: downloading & importing your RSA Soft
More informationIMS Health Secure Outlook Web Access Portal. Quick Setup
IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred
More informationVHA Innovations Program Future Technology Laboratory. Linux Workstation Remote Desktop Connection Manual 2014-10- 01
VHA Innovations Program Future Technology Laboratory Linux Workstation Remote Desktop Connection Manual 2014-10- 01 Table of Contents VHA Innovations Program... 1 Purpose... 3 Prerequisites... 3 Windows
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationNew Brunswick Internal Services Agency. RSA Self-Service Console User Guide
New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationEURECOM VPN SSL for students User s guide
EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...
More informationHow to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access)
1 How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access) San Antonio Community Hospital uses a strong authenticate method for remote access to ICIS. This
More informationWindows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationSecure File Transfer Protocol User Guide
Ministry of Health Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: November 12, 2013 Next Update: Version: 1.6 Approvals Signature Date Director, DA&IM Signature
More informationAllianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationDIS VPN Service Client Documentation
DIS VPN Service Client Documentation Background ------------------------------------------------------------------------------------------------ 1 Downloading the Client ---------------------------------------------------------------------------------
More informationThis document shows new Citrix users how to set up and log in to their Citrix account.
Citrix Set up Set up and Log in to Citrix Objective: This document shows new Citrix users how to set up and log in to their Citrix account. Procedure This document shows you how to set up and log in to
More informationHow To Use The Syndicate Bank Rsa Security Token For Internet Banking On Pc Or Mac Or Mac (For A Web Browser) For A Long Time (For An Ipad) For Free (For Free) For An Unlimited Time) For Your
Syndicate Bank Supply and Commissioning of Two Factor Authentication for Internet with Two Factor Authentication for Bank s Internal Users for Various Applications Desktop based User Manual for using SyndProtect
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationMiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
More informationDepartment of Supply & Services (CIMS) RSA Web Express User Guide v1.2
Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Created: May 22, 2008 Updated: April 23, 2009 The RSA Web Express web express web site automates functions required to deploy hardware
More informationWeston Public Schools Virtual Desktop Access Instructions
Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which
More informationRemote Access End User Guide (Cisco VPN Client)
Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED
More informationUSER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect
USER MANUAL CTBTO Remote Access VPN using Cisco AnyConnect 1 Table of Contents I. Purpose... 4 II. Scope... 4 III. Definitions and Acronyms... 4 IV. Background... 5 V. Requirements... 5 VI. General Installation
More informationWHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE
WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use
More informationVPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
More informationEnd User Configuration
CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationInstructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token
Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy Requirements
More informationAllianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 29 pages Table of Contents 1. Introduction to the Remote Access Page 3 2. Overview of Outlook Web Access
More informationHallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
More informationEndpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
More informationOpenVPN over SSH tunneling
Step 1: What you'll need before starting OpenVPN over SSH tunneling You're going to need a couple of things in order to create an SSH tunnel that you can use as a SOCKS 5 proxy for tunneling OpenVPN or
More informationRemote Access Instructions
document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN
More informationAccess to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop.
Overview of Help & Tips The new System allows authorized users to log in and access the Firm s network through either Citrix or VPN (also known as Stonegate IPSec VPN). This system incorporates additional
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend
More informationHow to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)
How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) Scenario # 1: Single Node or Standalone SA... 2 Scenario
More informationVMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationHow To Connect To Ecs.Org From A Pc Or Mac Or Ipad (For A Laptop) With A Network Connection (For Mac) With The Ipad Or Ipa (For Pc Or Ipac) With An Ipa Or Ip
1) Getting a Windows username and password... 2 2) Download VPN Client... 4 3) Installing VPN... 11 4) Configure VPN... 18 5) Firewall... 20 6) Connecting using VPN... 20 7) Setting up a default connection...
More informationSecurity Cooperation Information Portal
September 2015 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 4 Warning
More informationWeb File Management with SSH Secure Shell 3.2.3
Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationExternal Partner and Customer Login Instructions via myngc Portal
External Partner and Customer Login Instructions via myngc Portal https://www.myngc.com Purpose The purpose of this document is to provide the Northrop Grumman Corporation (NGC) external partners and customers
More informationRSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet
GLOSSARY RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet This guide applies, if you ve assigned a RSA SecureID TOKEN. For more information or
More informationGetting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment
Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment What services do I use with the old TKK password, and what do I use
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationCWOPA Broadband Users. Windows Operating System
CWOPA Broadband Users Windows Operating System October 2012 Background These instructions are to be used for VPN users who have been assigned a CWOPA username and password. If your machine has Internet
More informationUsing SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.
Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...
More informationMRU Secure Remote Access Service (SRAS) External User Guide
MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendors and external clients, restricted remote access to internal computing
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationHow to Set Up SSL VPN for Off Campus Access to UC eresources
How to Set Up SSL VPN for Off Campus Access to UC eresources Contents How to Set Up SSL VPN for Off Campus Access to UC eresources... 1 Off Campus Access via SSL VPN... 2 SSL VPN (Secure Sockets Layer
More informationHow to connect to the DGL Practice Manager Cloud Server from an Apple Mac
How to connect to the DGL Practice Manager Cloud Server from an Apple Mac Connecting to the DGL Practice Manager Hosted Servers requires the use of the "Microsoft Remote Desktop Client" application, which
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationRemote Desktop Services
Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows
More informationShellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
More informationWindows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.
Introduction These instructions are for Windows and MAC users ONLY. For Mobile devices (IOS/Android), use the Mobile Device document found on the portal Login Page. For Windows 8.x users: At this time,
More informationMCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
More informationSetting Up and Accessing VPN
Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication
More informationUsing TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
More informationSetting up CU@Round On line Account
Setting up CU@Round On line Account Created Date: October 6, 2009 Purpose: This document is a step by step process on how to set up a member s CU@Round online account. Note: The member will need the following
More informationE-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationRemote Online Support
Remote Online Support STRONGVON Tournament Management System 1 Overview The Remote Online Support allow STRONGVON support personnel to log into your computer over the Internet to troubleshoot your system
More informationLieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012
RSA SecurID Ready Implementation Guide Last Modified: March 20 th, 2012 Partner Information Product Information Partner Name Web Site Product Name Lieberman Software Corporation www.liebsoft.com Version
More informationAccessing the Mercy Remote Access Portal (SSL VPN)
MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following steps. ** Important:
More informationHow To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
More informationUsing Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista
Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and
More informationDial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
More informationSelf-Service Portal Registering, downloading & activating a soft token
Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office
REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your
More informationVirtual Private Network (VPN)
Virtual Private Network (VPN) Windows 7 March 2014 VPN provides users with access to the HQ private network, and the Internet using TCP/IP. Additionally, users will have access to: File servers Internal
More informationSecure File Transfer Protocol User Guide. Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7
Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: April 14, 2014 Version: 1.7 Secure File Transfer Protocol User Guide Table of Contents 1 Overview... 1 1.1 Purpose
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationE-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationE-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationInstalling Novell Client Software (Windows 95/98)
Installing Novell Client Software (Windows 95/98) Platform: Windows 95/98 Level of Difficulty: Intermediate The following procedure describes how to install the Novell Client software. This software allows
More information2. PMP New Computer Installation. & Networking Instructions
ONTARIO CHIROPRACTIC ASSOCIATION PATIENT MANAGEMENT PROGRAM PUTTING EXPERIENCE INTO PRACTICE PMP New Computer Installation & Networking Instructions This document provides installation instructions for
More informationHow To Log In To Northrop Grumman.Com With A Password Code And Password Code (For A Password)
External Supplier/Partner/Customer Login Instructions via myngc Portal https://www.myngc.com Purpose The purpose of this document is to provide the Northrop Grumman Corporation (NGC) external suppliers,
More informationInitial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
More informationATTENTION: End users should take note that Main Line Health has not verified within a Citrix
Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal
More informationConnecting to Delta College Exchange services off-campus
Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationRSA Authentication Manager 8.1 Help Desk Administrator s Guide
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
More informationRSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide
RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide Introduction The RSA SecurID Certified Administrator (CA) examination is based on the critical
More informationMRU Secure Remote Access Service (SRAS) External User Guide
MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendor and external clients restricted remote access to MRU internal computing
More informationThis guide provides all of the information necessary to connect to MoFo resources from outside of the office.
REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office. Connect remotely from your firm notebook using VPN Connect
More informationHow do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?
How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationRemote Access: Citrix Client Setup
Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop
More informationInstructions for accessing the new TU wireless Network
Instructions for accessing the new TU wireless Network These instructions are meant for University owned systems directly supported by ENS Computer Services. Users of other systems may find this document
More informationPortal Instructions for Mac
Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...
More informationStealth OpenVPN and SSH Tunneling Over HTTPS
Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions
More informationDownload and Install the Citrix Receiver for Mac/Linux
Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationConnecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN
Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN October 2013 In order to access the LRDC file server remotely/off campus, or from Wireless Pittnet, you must first authenticate
More informationInstalling LearningBay Enterprise Part 2
Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationTAMUS Terminal Server Setup BPP SQL/Alva
We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here
More information